Network security, achieved via out-of-the-box security group settings and traffic restrictions via a protected gateway, through which
all traffic is routed, avoiding the need to open multiple ports and protocols for each individual service.
Read more about Network Security.

Authenticated endpoints for all services and UIs that are supported. Read more about Authentication.

Controlled use of AWS resources using IAM roles. Read more about IAM Roles.

Security Best Practices and Checklist

Security Best Practices

Follow these best practices to ensure security of your AWS environment: